By: Emma Barnett CELL PHONE GPS: SAFETY OR STALKING DEVICES?

Slides:



Advertisements
Similar presentations
CHAPTER 7: LEARNING OUTCOMES
Advertisements

Hows Your Privacy? Social Networks & Cellphones Lt. Michael J. Kozak, Ret. X4 Echelon.
Components of the System
Developed by Technology Services 1:1 Laptop Initiative
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Mobile Location Services and Support by Alessandro Agnello 1 IWS2.
_Protecting Our Kids New Technology: New Pitfalls Purpose: To help families ask the right questions, and make an informed decision for their children regarding.
Development of a Surveillance Society By: Tyler Madden (Comp 1631, Winter 2011)
Technology in Education Issues we need to know. Social, Ethical, and Legal. By: Kara Bushey ECED 201.
PowerPoint Presentation Possible Topics Related to General Education Area VI Computer Science Appendix B.
How to keep your kids safe online
Chapel Hill Transit Want to know where your bus is?
1 INTRUSION ALARM TECHNOLOGY LOCAL VS. MONITORING.
Business Driven Technology Unit 4 Building Innovation Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without.
Company LOGO Internet Safety A Community Approach.
J. Chansavang. Use this Powerpoint to gain understanding about the main areas that are affected by computers and technology. Possible research topics.
INTERNET SAFETY FOR PARENTS. AGENDA  Awareness for internet usage  Safety tips for parents  Social Networking  Cyberbullying  Sexting  Resources.
THE FANTASTIC GPS SYSTEM By Sean Callahan and George Martinez.
AS ICT.  A portable communication device is a pocket sized device that is carried around by an individual  They typically have a display screen with.
Basic Data Communication
CHAPTER OVERVIEW SECTION 7.1 – Connectivity: The Business Value of a Networked World Overview of a Connected World Benefits of a Connected World Challenges.
Internet Safety Portage Department of Public Safety.
Chapter 5: Computer Networks
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Secure Systems Research Group - FAU Wireless Web Services Security Christopher Lo.
Stay Safe & Secure Online. Outline Passwords Everyday Security Security Physical Security Protecting Personal Information.
Networking Two or more computers linked together so that it is capable of sending messages between them. Network Stand Alone Computer.
Wireless Communication. Learning Objectives: By the end of this topic you should be able to: describe wireless communication methods, describe wireless.
IT security By Tilly Gerlack.
Cintas Fire Protection
INTERNET- A BOON OR A CURSE AYUSHI PRADHAN. WHAT IS IT? Internet or INTERnational NETwork is a network of networks that crisscrosses the globe and even.
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved BUSINESS PLUG-IN B21 Mobile Technology.
 Introduction  Components of Wi-Fi and its working  IEEE Architecture  Advantages and Limitations.
Lecture 17 Page 1 CS 236 Online Network Privacy Mostly issues of preserving privacy of data flowing through network Start with encryption –With good encryption,
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
HOW THEY WORK A cell phone is basically like a A cell phone uses one frequency to talk and another to listen When you make call, When you talk the cell.
Computing in the Modern World Unit 4. GPS: BCS-CMW-8. Students will demonstrate knowledge of basic components of computer networks.
Complying with Acceptable Use Policies.  AUP  Code of Conduct for Internet Use  Used by Organizations and Businesses  Outlines agreement in writing.
Edware Solutions ® Edsafe ™ Next Generation Student Safety System.
E-safety By Nicholas + Jamie. What is E-safety  E-Saftery stands for electronic safety. Its all about staying safe on your elctronic divices. It is concerned.
GPS Survey Equipment City Planning Construction Environmental Studies.
By Tyler Daniels.  Privacy  - Employers monitoring employees every move  - Can get employees fired for doing things they didn’t know were being monitored.
Agenda Last class: Network Protocols Today: Wireless Technology –How do computers talk to each other… with no wire connecting them?
Business Driven Technology Unit 4 Building Innovation Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill/Irwin.
© 2010 Pearson Education, Inc. | Publishing as Prentice Hall. Computer Literacy for IC 3 Unit 3: Living Online Chapter 1: Understanding the Internet.
THINK CYBER SMART, BE CYBER SMART! CYBER SAFETY AND DIGITAL CITIZENSHIP IN A CLASSROOM.
. There are 2 ways in which Cable Ties can use the technicians smartphone to track their current location. 1. GPS – uses satellites to triangulate the.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
HART RESEARCH ASSOTESCIA Key findings from telephone survey of parents of children who access the Internet, conducted for Who Needs Parental Controls?
Questions When have you used GPS? GPS technology uses satellites to pinpoint position on Earth with the aid of a GPS device or unit Have you ever used.
Laws and Rules That Govern Internet Safety Ashley Martin.
Portable Communication Devices Hyper linking. Satellite Navigation Systems Satellite Navigation Systems Mobile Phones Mobile Phones Portable Media Players.
Online Safety Top Areas of Concern – Fast Facts  Cyberbullying 43% of teens say they’ve experienced it in past year 1 More prevalent among girls.
CELL PHONES FOR KIDS OVER 5. BY: MATTHEW LIA. Imagine this… you leave your son in the car to go into the grocery store. Then a guy steals your car and.
Your Interactive Guide to the Digital World Discovering Computers 2012 Chapter 9 Networks and Communications.
There is a lot to talk about if we think of the advantages of a wireless connection, the most important of its aspects is mobility and everything that.
Kids’ GPS watch Q50 Q523 Step by step guide Apply for the watch ID starting with 145.
 Internet access is the process that enables individuals and organizations to connect to the Internet using computer terminals, computers, and mobile.
The internet is a place of both useful and bad information. It has both good and bad side- and it’s all too easy for kids to stray into it. And no parents/guardian.
3 REASONS WHY TIME CLOCK SOFTWARE CAN BOOST YOUR PROFITS In this unstable economy, most business organizations are ready to embrace whatever legal cost-cutting.
St. Anne’s Baslow Online Safety Before we start… O Throughout this meeting I hope to provide information that you will find useful in keep your.
Your app in need is your friend indeed.  Ensures safety  Free download  Suitable for all phones  It’s user friendly.
Geolocation.
Facebook privacy policy
4 Ways to Set Up Parental Controls On Your Home Network
Unit: Sound and Light Lesson 3: Wireless Communication
Introduction to Wireless Technology
Home and personal communication systems
E-Safety.
Presentation transcript:

By: Emma Barnett CELL PHONE GPS: SAFETY OR STALKING DEVICES?

Privacy and Anonymity SOCIAL/ETHICAL CONCERNS

 Primary Stakeholder  Cell phone owners  The cell phone owners are being affected by stalkers using GPS signals from their cellphones. STAKEHOLDER

 GPS Satellites  GPS receivers rely on radio waves by communicating with satellites that orbit the Earth. There are currently 27 GPS satellites in orbit, but only 24 are active. The other 3 are back ups. Your location is determined by triangulating your signal between 3 satellites.  Cell Towers  Cell towers stay on the ground at base stations. They send and receive radio signals from a cell phone. This is not always exact because they only show which cell tower the cell phone is closest too.  Wireless Access Points  Wireless access points allow cell phones to connect to a wired network using Wi-Fi or Bluetooth. WAPs perform modulation, which is the transfer of data in or out of the access point. CELL PHONE GPS: HOW DOES IT WORK?

 Video  0U&feature=youtube_gdata_player 0U&feature=youtube_gdata_player CELL PHONE GPS TRACKING SOFTWARE

 Location Tracking  GPS enabled tracking programs provide the location of the cell phone coordinates. This can be automatically turned on by a cell phone provider.  Pay As You Go Tracking Programs  These programs must be downloaded and activated on the actual cell phone. The cell phone can then be located at any time by logging in online.  Friend Location Software  These programs are downloaded and turned on manually by the user. GPS records the location of the cell phone and the user can get game points for going to certain restaurants, stores, etc. Ex: Foursquare. LOCATION BASED SERVICES

 Parents can track their kids without their knowledge.  Employers can track their employees without their knowledge.  Spouses can track spouses without their knowledge.  Stalkers can hack or install an app to get the location of a user without their knowledge. SOCIAL AND ETHICAL ISSUES

 Positives  Parents know where their kids are at all times.  Parents could rescue a child in need.  Keeps kids safe.  Negatives  It usually costs money  Kids don’t always know they are being tracked.  Invasion of privacy. PARENTS TRACKING KIDS

 Positives  Employers can protect their business.  Employers can watch their employees.  Safety Reasons  Negatives  Employees have a right to privacy.  Employees may not know they are being tracked.  Employees often take their phones home EMPLOYERS TRACKING EMPLOYEES

 Positives  Catch a cheating spouse  Safety  Negatives  Privacy Issue  Can cause marital problems SPOUSES TRACKING SPOUSES

 Positives  Stalkers succeeds.  Negatives  Puts people in danger.  Makes problems for phone companies STALKERS STALKING VICTIMS

 People are affected by stalking everyday.  Stalkers can access the GPS signal in a cell phone and stalk their victims even more efficiently.  The story of James Harrison MAIN CONCERN OF STALKING

 Mandatory notification of GPS activation.  Stronger government regulations regarding GPS policies in spyware apps.  Strengthening stalking laws to improve safety and regulation of technological stalking. SOLUTION

 Strengths  Taking the political route.  Protecting the rights of the victims.  Weaknesses  May take time to implement new laws and regulations.  Infringing on free market opportunities.  Even with strong laws, people will still break them. STRENGTHS AND WEAKNESSES

  2/gps_a_stalkers_best_friend.html 2/gps_a_stalkers_best_friend.html   tube_gdata_player tube_gdata_player WORKS CITED